MS12-046: Vulnerability in Visual Basic for Applications Could Allow Remote Code Execution (2707960)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

Arbitrary code can be executed on the remote host through Visual Basic
for Applications.

Description :

The version of Visual Basic for Applications installed on the remote
host is affected by an insecure library loading vulnerability.

A remote attacker could exploit this flaw by tricking a user into
opening a legitimate Microsoft Office file located in the same
directory as a maliciously crafted dynamic link library (DLL) file,
resulting in arbitrary code execution.

Note that if an affected copy of VBE6.DLL was installed by a third-
party application, it may be necessary to contact that application's
vendor for an update.

See also :

http://technet.microsoft.com/security/advisory/2269637
http://technet.microsoft.com/en-us/security/bulletin/ms12-046

Solution :

Microsoft has released a set of patches for Office as well as Visual
Basic for Applications Runtime and SDK.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 59909 ()

Bugtraq ID: 54303

CVE ID: CVE-2012-1854